Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Network Synergy can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 203.261.2201 to ensure your business is protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Programming Operations Disaster Alert Webcam Collaboration Security Data Nanotechnology App Healthcare Technology Laws Customer Relationship Management IT Consulting Augmented Reality Upgrades Domains Break Fix Google Docs Managed Service Provider Robot Avoiding Downtime Web Server Computer Care The Internet of Things Licensing Lenovo Relocation Travel Compliance Experience Office Competition Data Backup Training Botnet How To Knowledge LinkedIn Users Tip of the week Black Market Dark Web Administration Computer Accessories Big Data Network Security Server Management Data Loss Content Filtering Malware Hacker Online Currency Two-factor Authentication Technology Tips Sports Access Control Alerts Language Marketing Maintenance Leadership Backup Spyware Cleaning Tutorials Remote Monitoring Wireless Technology Vendor Management Personal Information Remote Support Macro Digital Payment Customer Service Tech Support Conferencing Mobile Devices Bitcoin Blockchain Crowdsourcing Fun Wi-Fi Business Management Phone System Telephone Systems Business Owner Unified Threat Management Migration 3D Law Firm IT Bandwidth Digital Work/Life Balance Saving Money Troubleshooting SaaS Communication Network Office Tips Backups Emoji Documents Trending Virtual Reality Wearable Technology Word IT budget Password Taxes Applications IT Consultant Mobile Technology Government Email Battery Notifications Cabling Black Friday BDR Privacy Business Continuity Data Security Permissions Disaster Resistance Social Engineering WiFi Identities Hiring/Firing Administrator Distributed Denial of Service Artificial Intelligence Recovery Excel Virtual Desktop Error Star Wars Company Culture Social Networking History Vulnerability Intranet Mobility Value Innovation Gmail IT Services Passwords Disaster Recovery Lithium-ion Battery Virtual Private Network Statistics Data Management Automation Cyber Monday Staff Windows 10 Computer Repair Best Practices Corporate Profile Miscellaneous Project Management User Flexibility User Error Microsoft Excel Cookies iPhone Remote Computing Private Cloud Encryption Mobile Device Crowdfunding Software Tips G Suite IBM Modem BYOD Unified Communications Technology Connectivity Best Available Help Desk Techology Router Printing Cameras Business Growth Fax Server IoT Supercomputer Downloads Electronic Medical Records Cryptocurrency Work Station Bring Your Own Device Gaming Console Websites Recycling VPN Safety Spam Time Management Printer Smart Tech Hosted Solutions Business Technology Monitors Microsoft Inbound Marketing Hackers Mirgation Machine Learning Touchscreen Tracking Social Media Computer Outlook Productivity Patch Management VoIP Information Technology 3D Printing Hardware Mobile Data Analyitcs PDF Android Net Neutrality eBay Charger Software as a Service IT Technicians Public Speaking Point of Sale Gadget Specifications Mouse Social Data storage CrashOverride Telephony Twitter Superfish Presentation Cybercrime Text Messaging Paperless Office Virus Infrastructure Identity Theft Business Windows People Hacking Workplace Tips Holiday Law Enforcement Laptop Business Intelligence Computing Infrastructure Windows 10 Upgrade Hacks Identity Internet Risk Management Google Analytics Deep Learning Sync Solid State Drive Mail Merge Hard Drives Cloud Cloud Computing Managed IT Cooperation Website Streaming Media Data Breach Saving Time Scam Downtime eWaste Mobile Computing Apple Windows 8.1 Update Cybersecurity Tip of the Work CIO Utility Computing IT Support Chromebook Mobile Device Management Proactive IT Assessment PowerPoint Buisness Tablet Typing Google Wallet Heating/Cooling Print Server Quick Tips Network Congestion Piracy Business Computing LiFi Small Business Samsung Uninterrupted Power Supply Phishing Consultation Servers Secruity 5G Skype IT service Scheduling Video Surveillance Memory Co-managed IT Save Money Office 365 Search Consumers Managed IT services Motherboard Tip of the Week Save Time Legal Scary Stories Software Processors Google Shortcut YouTube Budget IT Support communications Chatbots Unsupported Software Managed IT Service Settings Motion sickness Smart Technology Employer-Employee Relationship Efficiency Start Menu Thank You Webinar Hard Disk Drive Environment Google Drive Outsourced IT Managed IT Services Running Cable Hosted Solution Computing Browser Hard Drive Cache Networking Best Practice Health Refrigeration Redundancy Storage Apps Physical Security Tech Term USB Staffing Meetings Address Application Files Gadgets Bluetooth HIPAA Ransomware Digital Signature Unified Threat Management Cortana Smartphone Food Debate Halloween Network Management End of Support Humor Politics Logs Server Entrepreneur Money Education Going Green Google Calendar Writing Mobile Security Productivity Firewall Regulations Computers Windows 8 Screen Reader Smartphones Trainging SharePoint Antivirus Internet Exlporer Undo Chrome Automobile Comparison Facebook Internet of Things Data Warehousing Virtualization Document Management File Sharing User Tips Mobile Office PC Care Current Events Drones Firefox Cost Management IT Solutions Display CCTV GPS Congratulations Multi-Factor Security Retail Service-based Business Google Maps Alt Codes IT Management Data Recovery IP Address Legislation Public Cloud Operating System Wireless Fraud Microsoft Office Hotspot

      Latest Blogs

      Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the dow...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube